CVE-2023-0179
📋 TL;DR
A buffer overflow vulnerability in the Linux Kernel's Netfilter subsystem allows local attackers to leak memory addresses and potentially execute arbitrary code. This could lead to local privilege escalation to root on affected Linux systems. Any system running a vulnerable Linux kernel version with Netfilter enabled is at risk.
💻 Affected Systems
- Linux Kernel
📦 What is this software?
Enterprise Linux For Ibm Z Systems by Redhat
View all CVEs affecting Enterprise Linux For Ibm Z Systems →
Enterprise Linux For Power Little Endian by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian →
Enterprise Linux For Power Little Endian Eus by Redhat
View all CVEs affecting Enterprise Linux For Power Little Endian Eus →
Enterprise Linux For Real Time For Nfv by Redhat
View all CVEs affecting Enterprise Linux For Real Time For Nfv →
Fedora by Fedoraproject
Fedora by Fedoraproject
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
Ubuntu Linux by Canonical
⚠️ Risk & Real-World Impact
Worst Case
Local attacker gains full root privileges, compromising the entire system and potentially pivoting to other systems.
Likely Case
Local user escalates privileges to root, gaining complete control over the affected system.
If Mitigated
Attack fails due to kernel hardening features like KASLR or SMEP/SMAP, or system is patched.
🎯 Exploit Status
Exploit requires local access and some technical knowledge. Proof-of-concept code has been published.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Varies by distribution; check vendor advisories for specific patched kernel versions
Vendor Advisory: https://bugzilla.redhat.com/show_bug.cgi?id=2161713
Restart Required: Yes
Instructions:
1. Check your Linux distribution's security advisories. 2. Update kernel package using your package manager (apt/yum/dnf). 3. Reboot the system to load the new kernel.
🔧 Temporary Workarounds
Disable Netfilter modules
linuxUnload vulnerable Netfilter kernel modules if not required
sudo rmmod nf_tables
sudo rmmod nfnetlink
Restrict kernel module loading
linuxPrevent loading of vulnerable modules
echo 'install nf_tables /bin/false' | sudo tee /etc/modprobe.d/disable-nftables.conf
echo 'install nfnetlink /bin/false' | sudo tee /etc/modprobe.d/disable-nfnetlink.conf
🧯 If You Can't Patch
- Implement strict access controls to limit local user accounts
- Enable kernel hardening features like KASLR, SMEP, and SMAP
🔍 How to Verify
Check if Vulnerable:
Check kernel version against your distribution's security advisory. Example: uname -r
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched version from vendor advisory
📡 Detection & Monitoring
Log Indicators:
- Kernel panic or oops messages
- Unusual privilege escalation attempts in audit logs
- Failed module loading attempts
Network Indicators:
- Not applicable - local exploit only
SIEM Query:
source="kernel" AND ("Oops" OR "panic" OR "general protection fault") OR source="audit" AND ("privileged" OR "root") AND action="failed"
🔗 References
- http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2161713
- https://seclists.org/oss-sec/2023/q1/20
- https://security.netapp.com/advisory/ntap-20230511-0003/
- http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2161713
- https://seclists.org/oss-sec/2023/q1/20
- https://security.netapp.com/advisory/ntap-20230511-0003/